The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
The post Demystifying targeted malware used against Polish banks appeared first on WeLiveSecurity
Antivirus Vendors
The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland.
The post Demystifying targeted malware used against Polish banks appeared first on WeLiveSecurity
RSA feels like a mashup of giant tech Titans steadily swallowing up the little guys to make one massive, unholy tech monster. But how does that really work for small businesses as customers, and the rest of us?
The post RSA 2017: The year the little guys get swallowed up appeared first on WeLiveSecurity
Don’t worry about the mental stability of your pilot — there might not be one in the future. Test flights of an autonomous jet are taking off now in the UK.
The post Fly the rant-free, pilot-free skies appeared first on Avira Blog.
Gmail rolls out a new policy to block JavaScript attachments, increasing security restrictions as ransomware attacks increase.
The post Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected? appeared first on WeLiveSecurity
The ongoing cybersecurity skills gap is dealing a significant blow to the confidence of organizations looking to defend themselves against potential attacks.
The post Organizations ‘concerned by cybersecurity skills gap’ appeared first on WeLiveSecurity
Kaspersky Lab researchers have examined the security of applications for the remote control of cars from several famous car manufacturers.
In the movie Ghostbusters, the imaginary threats ranged from Psychomagnotheric Slime to the Stay Puft Marshmallow Man and Gozer the Gozerian, armed with slime and a bagful of Hollywood special effects. In the real world, small and medium businesses face a growing range of internal and external cybersecurity (CybSec) threats that are just as scary, while at the same time they are handicapped by a shortage of skills and resources. With most SMBs (55 percent) the victim of a cyberattack within the last 12 months, and 60 percent going out of business within six months, it makes partnering with a CybSec specialist (AKA CyberThreatBusters) a necessity.
Court orders squeeze-out of minority shareholders of AVG Technologies B.V. a subsidiary of Avast Software B.V.
Prague, Czech Republic / Amsterdam, The Netherlands, February 15, 2017 – Avast Software B.V. (“Avast“) announces that yesterday the Enterprise Chamber of the Court of Appeal in Amsterdam, the Netherlands (the “Enterprise Court“) entered its judgment in the statutory squeeze-out proceedings initiated by Avast against the minority shareholders of AVG Technologies B.V. (“AVG“).
The Enterprise Court found that EUR 22.84 (being the offer price of USD 25.00 converted into EUR against the exchange rate of October 31, 2016) is the fair squeeze-out price per share in AVG and ordered all minority shareholders of AVG to transfer their shares to Avast in exchange for a payment of EUR 22.84 per share in cash, increased by statutory interest to be calculated over the period from October 31, 2016 until the date of transfer of the shares.
Up until March 15, 2017, shareholders of AVG may voluntarily adhere to the judgment of the Enterprise Court by transferring their shares in AVG to Avast. Shareholders should contact their bank, broker or other financial intermediary to obtain information on how to transfer their shares in AVG to Avast.
On or shortly after March 16, 2017, Avast will enforce the judgment of the Enterprise Court against the remaining shareholders of AVG and pay the aggregate squeeze-out price for the remaining shares in AVG into the consignment fund of the Dutch Ministry of Finance. As of that date, all shares in AVG that have not been transferred to Avast voluntarily will be transferred to Avast by operation of law, and the former holders of these shares will then be entitled to receive payment of the squeeze-out price for each share held as of March 16, 2017 from the consignment fund of the Dutch Ministry of Finance only.
* * *
About Avast
Avast Software (www.avast.com), the global leader in digital security products for businesses and consumers, protects over 400 million people online. Avast offers products under the Avast and AVG brands that protect people from threats on the internet and the evolving IoT threat landscape. The company’s threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, OPSWAT, ICSA Labs, West Coast Labs and others. Avast is backed by leading global private equity firms CVC Capital Partners and Summit Partners.
Forward-Looking Statements
This press release contains forward-looking information that involves substantial risks and uncertainties that could cause actual results to differ materially from those expressed or implied by such statements. All statements other than statements of historical fact are, or may be deemed to be, forward-looking statements within the meaning of the U.S. federal securities laws, and involve a number of risks and uncertainties. In some cases, forward-looking statements can be identified by the use of forward-looking terms such as “anticipate,” “estimate,” “believe,” “continue,” “could,” “intend,” “may,” “plan,” “potential,” “predict,” “should,” “will,” “expect,” “are confident that,” “objective,” “projection,” “forecast,” “goal,” “guidance,” “outlook,” “effort,” “target,” “would” or the negative of these terms or other comparable terms. There are a number of important factors that could cause actual events to differ materially from those suggested or indicated by such forward-looking statements and you should not place undue reliance on any such forward-looking statements. These factors include risks and uncertainties related to, among other things: general economic conditions and conditions affecting the industries in which Avast and AVG operate and the squeeze-out proceedings initiated by Avast against the minority shareholders of AVG. Additional information regarding the factors that may cause actual results to differ materially from these forward-looking statements is available in AVG’s filings with the U.S. Securities and Exchange Commission, including AVG’s Annual Report on Form 20-F for the year ended December 31, 2015. These forward-looking statements speak only as of the date of this release and neither Avast nor AVG assumes any obligation to update or revise any forward-looking statement, whether as a result of new information, future events and developments or otherwise, except as required by law.
Contacts
Avast Software
Marina Ziegler
PR & Communications Director
+49-(0)89-3815331-17
[email protected]
###
Mobile gaming is huge! According to a report recently released by market research firm SuperData, the global mobile gaming sales revenue in 2016 was over $40 billion. The mobile gaming market is now bigger than the global tea market and the global naval market. According to SuperData, the trend will only increase as mobile gaming is getting the support of the emerging multi-billion VR industry.
In 2016 more than 97% of VR headsets sold were for mobile devices. Having in mind the price Oculus, Sony and HTC are offering for their flag products; it is not a surprise that budget solutions such as Google cardboard and Samsung Gear VR ended up accounting for almost all VR headsets sold last year.
While maritime safety and tea are losing the battle against Candy Crush Saga and Pokemon GO, the security of the people enjoying the perks of their ultra-powerful mobile handsets might be compromised.
It may sound tempting to be able to teleport yourself onto a roller coaster while sitting on the couch at home, but games which break the perception of the presence could be dangerous. Similar to motion sickness, some VR players tend to experience virtual reality sickness. Stop gaming immediately should you start feeling disoriented or you have symptoms such as a headache or nausea. There are reported cases of people who lost their lives while hunting Pokémons so augmented reality could be dangerous too. Keep your eyes open for the surrounding area!
You’ve finally found the most amazing mobile game in the world – it has amazing graphics, it is real time, and the game is endorsed by your favourite celebrity! What could go wrong? A lot of things, such as the status of your bank account. Mobile games sometimes have in-app purchases, make sure you check before getting an additional weapon or skipping an advert that is currently playing it may end up costing you real money. Unfortunately, they do not accept doubloons in the real world, so the more prepared you are, the better.
It is a well-known fact that 90% of the children, aged 12 years or less, are mobile gamers (using their cell phone or a borrow from a family member) and these phones need to be protected to avoid the potentials risks of uncontrolled purchases.
Make sure to always download applications from the Play Store or the App Store. Sometimes apps connect to your social media profiles, and they can see personal information such as your full name, date of birth, location and even your home address.
If the app you have on your phone is not approved, you may end up not only sharing all this valuable information with the wrong people, but you may install a virus on your phone that can lurk around your mobile handset and steal your passwords. Stay alerted and stick to the approved apps on the Play Store and the App Store, and even then, use services that allow you to scan the applications that you are installing on your phone.
To use this feature, you must set an unlock PIN and select the apps you want to lock. Should you forget your PIN, you’ll be able to reset it through your Panda Security account.
Children already spend more time on the Internet than watching TV. Their favourite content is on emerging video platforms such as YouTube. A huge percentage of children nowadays have smartphones, and even though regulations tend to be strict, you don’t want your kid to be able to access chat rooms and content that is not monitored by you. Predators thrive on new ways of getting in touch with vulnerable people, and mobile gaming is one of those places.
Some games have chat rooms where people can socialize. Relying on admins may not be a full solution so make sure you know where you and your kids go while taking a breath before launching the next game on your cell phone. Always check out the PEGI ratings of an app before you let your child access it unless you want your 13-year-old son to get better than you on Texas hold ’em poker. Kids need restriction so don’t forget to use a PIN-protect access to the apps you want to control.
Panda’s Mobile Security for Android has a feature that allows you to PIN-protect access to your apps. The feature comes with privacy protection that prevents from unauthorized access to messaging apps and social media sites. The feature also comes with parental control functions that help you restrict the little ones from accessing certain apps, games, etc.
Hackers are cruel and unfortunately technology savvy. They are always finding new ways of approaching you and your loved ones. Innovation is what they do best, and even though antivirus companies tend to be a step ahead of them, not everyone has protection. As mobile phones and mobile gaming are taking an increasingly bigger part of our lives, we firmly advise you to keep your eyes open and always bear in mind that sometimes even the App Store and the Play Store might miss something and let you install an infected app.
While hackers keep finding new ways to get your money, we are solely focused on preventing them from being successful by constantly adapting to their new habits.
Luckily, Panda Security offers the best mobile security protection for all your devices including cell phones and tablets. Check out our security service solution here and be protected while gaming on your mobile device.
The post Online gaming safety tips appeared first on Panda Security Mediacenter.
Researchers have described how ransomware could potentially attack industrial control systems (ICS), and demonstratied how new malware threats might target core infrastructure, holding entire cities hostage.
The post Proof-of-concept ransomware to poison the water supply appeared first on WeLiveSecurity